Patents by Inventor Regina Illner
Regina Illner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10956440Abstract: Documents are compressed. A partially compressed document is obtained. The partially compressed document includes one or more code words that replace one or more common tokens of a document to be compressed. The one or more common tokens are tokens common to a plurality of documents, and included in a common dictionary. The common dictionary provides a mapping of code words to common tokens. A document associated dictionary is created from non-common tokens of the document to be compressed. The document associated dictionary provides another mapping of other code words to the non-common tokens. A compressed document is created. The creating of the compressed document includes replacing one or more non-common tokens of the partially compressed document with one or more other code words of the document associated dictionary. The compressed document includes the one or more code words of the partially compressed document and the one or more other code words of the document associated dictionary.Type: GrantFiled: October 16, 2017Date of Patent: March 23, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jochen Roehrig, Thomas H. Gnech, Steffen Koenig, Regina Illner, Oliver Petrik, Christian Zoellin
-
Patent number: 10904023Abstract: A computer-implemented method includes receiving a request to multicast a message, wherein the request includes the message and a restriction bundle. The computer-implemented method further includes generating a distribution list for a first set of devices in a plurality of registered devices based, at least in part, on an overlap between a registered range of a device and a multicast range included in the restriction bundle. The computer-implemented method further includes determining a first subset of devices from the first set of devices based, at least in part, on a set of registered property values associated with each device meeting the criteria of each restriction in the restriction bundle. The computer-implemented method further includes multicasting the message to the first subset of devices. A corresponding computer system and computer program product are also disclosed.Type: GrantFiled: June 11, 2019Date of Patent: January 26, 2021Assignee: International Business Machines CorporationInventors: Joachim Rese, Thomas H. Gnech, Regina Illner, Sabine U. Jaeschke, Ilke Tiebs
-
Publication number: 20190296923Abstract: A computer-implemented method includes receiving a request to multicast a message, wherein the request includes the message and a restriction bundle. The computer-implemented method further includes generating a distribution list for a first set of devices in a plurality of registered devices based, at least in part, on an overlap between a registered range of a device and a multicast range included in the restriction bundle. The computer-implemented method further includes determining a first subset of devices from the first set of devices based, at least in part, on a set of registered property values associated with each device meeting the criteria of each restriction in the restriction bundle. The computer-implemented method further includes multicasting the message to the first subset of devices. A corresponding computer system and computer program product are also disclosed.Type: ApplicationFiled: June 11, 2019Publication date: September 26, 2019Inventors: Joachim Rese, Thomas H. Gnech, Regina Illner, Sabine U. Jaeschke, Ilke Tiebs
-
Patent number: 10397010Abstract: A computer-implemented method includes receiving a request to multicast a message, wherein the request includes the message and a restriction bundle. The computer-implemented method further includes generating a distribution list for a first set of devices in a plurality of registered devices based, at least in part, on an overlap between a registered range of a device and a multicast range included in the restriction bundle. The computer-implemented method further includes determining a first subset of devices from the first set of devices based, at least in part, on a set of registered property values associated with each device meeting the criteria of each restriction in the restriction bundle. The computer-implemented method further includes multicasting the message to the first subset of devices. A corresponding computer system and computer program product are also disclosed.Type: GrantFiled: November 30, 2017Date of Patent: August 27, 2019Assignee: International Business Machines CorporationInventors: Joachim Rese, Thomas H. Gnech, Regina Illner, Sabine U. Jaeschke, Ilke Tiebs
-
Publication number: 20190165960Abstract: A computer-implemented method includes receiving a request to multicast a message, wherein the request includes the message and a restriction bundle. The computer-implemented method further includes generating a distribution list for a first set of devices in a plurality of registered devices based, at least in part, on an overlap between a registered range of a device and a multicast range included in the restriction bundle. The computer-implemented method further includes determining a first subset of devices from the first set of devices based, at least in part, on a set of registered property values associated with each device meeting the criteria of each restriction in the restriction bundle. The computer-implemented method further includes multicasting the message to the first subset of devices. A corresponding computer system and computer program product are also disclosed.Type: ApplicationFiled: November 30, 2017Publication date: May 30, 2019Inventors: Joachim Rese, Thomas H. Gnech, Regina Illner, Sabine U. Jaeschke, Ilke Tiebs
-
Publication number: 20190115934Abstract: Documents are compressed. A partially compressed document is obtained. The partially compressed document includes one or more code words that replace one or more common tokens of a document to be compressed. The one or more common tokens are tokens common to a plurality of documents, and included in a common dictionary. The common dictionary provides a mapping of code words to common tokens. A document associated dictionary is created from non-common tokens of the document to be compressed. The document associated dictionary provides another mapping of other code words to the non-common tokens. A compressed document is created. The creating of the compressed document includes replacing one or more non-common tokens of the partially compressed document with one or more other code words of the document associated dictionary. The compressed document includes the one or more code words of the partially compressed document and the one or more other code words of the document associated dictionary.Type: ApplicationFiled: October 16, 2017Publication date: April 18, 2019Inventors: Jochen Roehrig, Thomas H. Gnech, Steffen Koenig, Regina Illner, Oliver Petrik, Christian Zoellin
-
Publication number: 20170344131Abstract: In an approach to pointer positioning, a computing device receives an instruction to enter a Move Mode. The computing device magnifies, in Move Mode, screen content to generate a virtual display. The computing device displays a first portion of the virtual display and a fixed pointer on the virtual display. The computing device receives physical movement data. The computing device analyzes the physical movement data. The computing device displays a second portion of the virtual display based on the analyzed physical movement data. The computing device receives an instruction to leave Move Mode. The computing device deactivates Move Mode.Type: ApplicationFiled: February 7, 2017Publication date: November 30, 2017Inventors: Thomas H. Gnech, Regina Illner, Joachim Rese
-
Publication number: 20170344217Abstract: In an approach to pointer positioning, a computing device receives an instruction to enter a Move Mode. The computing device magnifies, in Move Mode, screen content to generate a virtual display. The computing device displays a first portion of the virtual display and a fixed pointer on the virtual display. The computing device receives physical movement data. The computing device analyzes the physical movement data. The computing device displays a second portion of the virtual display based on the analyzed physical movement data. The computing device receives an instruction to leave Move Mode. The computing device deactivates Move Mode.Type: ApplicationFiled: May 31, 2016Publication date: November 30, 2017Inventors: Thomas H. Gnech, Regina Illner, Joachim Rese
-
Patent number: 9250886Abstract: A method for optimizing provisioning workflows in cloud computing is provided. The method comprises determining a time coefficient for each resource type or aggregated resource types which define the installation time of a current workflow; accessing the current workflow and creating a tree topology based on the current workflow which defines serialized and parallelized provisioning steps; dividing the tree topology into independent sub-paths; determining a timing condition for an execution time of an optimized workflow; creating an optimized workflow template maintaining the timing condition by: selecting cheapest installation methods and cheapest resources; and reducing the parallelization of the tree topology; creating the optimized workflow by merging the optimized workflow template with data and the resource types of the current workflow.Type: GrantFiled: June 20, 2012Date of Patent: February 2, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas H. Gnech, Regina Illner, Steffen Koenig, Oliver Petrik
-
Patent number: 9003323Abstract: A method is provided for automatically displaying context information to an information fragment with no user interaction. The method includes: displaying the fragment in a first window, wherein the window and fragment each relate to a source process; pointing with a cursor to a part of the fragment displayed in the first window; generating an event object comprising coordinates of the cursor and part of the information fragment; broadcasting the event object to the source process, wherein the only information exchange between the target process and the source process is based on the event object; interpreting the event object by the target process and generating a response by the target process; and displaying the response of the target process in a second window, wherein the second window is related to the coordinates of the cursor.Type: GrantFiled: April 10, 2012Date of Patent: April 7, 2015Assignee: International Business Machines CorporationInventors: Thomas H. Gnech, Regina Illner, Joachim Rese
-
Publication number: 20130007244Abstract: A method for optimizing provisioning workflows in cloud computing is provided. The method comprises determining a time coefficient for each resource type or aggregated resource types which define the installation time of a current workflow; accessing the current workflow and creating a tree topology based on the current workflow which defines serialized and parallelized provisioning steps; dividing the tree topology into independent sub-paths; determining a timing condition for an execution time of an optimized workflow; creating an optimized workflow template maintaining the timing condition by: selecting cheapest installation methods and cheapest resources; and reducing the parallelization of the tree topology; creating the optimized workflow by merging the optimized workflow template with data and the resource types of the current workflow.Type: ApplicationFiled: June 20, 2012Publication date: January 3, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas H. GNECH, Regina ILLNER, Steffen KOENIG, Oliver PETRIK
-
Publication number: 20120297333Abstract: A method is provided for automatically displaying context information to an information fragment with no user interaction. The method includes: displaying the fragment in a first window, wherein the window and fragment each relate to a source process; pointing with a cursor to a part of the fragment displayed in the first window; generating an event object comprising coordinates of the cursor and part of the information fragment; broadcasting the event object to the source process, wherein the only information exchange between the target process and the source process is based on the event object; interpreting the event object by the target process and generating a response by the target process; and displaying the response of the target process in a second window, wherein the second window is related to the coordinates of the cursor.Type: ApplicationFiled: April 10, 2012Publication date: November 22, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Thomas H. GNECH, Regina ILLNER, Joachim RESE
-
Publication number: 20090193263Abstract: The system reuses the classic User ID & Password combination for authentication and adds a third component called a USE code for additional authorization check, as an example. This method allows access to a system when it is requested with correct User ID and Password (i.e., with correct pass code) but with an unauthorized USE code, the system identifies it as an unauthorized access and triggers the proper security measures to minimize the damage and monitor the actions in a way not to alarm the unauthorized user who is using the owner's credential to access the system. The USE Code is an extension to the pass code to raise various alarms and have a stepwise access level control based on different inputted values.Type: ApplicationFiled: December 31, 2008Publication date: July 30, 2009Inventors: Thomas Hermann Gnech, Regina Illner
-
Patent number: 7480805Abstract: The system reuses the classic User ID & Password combination for authentication and adds a third component called a USE code for additional authorization check, as an example. This method allows access to a system when it is requested with correct User ID and Password (i.e., with correct pass code) but with an unauthorized USE code, the system identifies it as an unauthorized access and triggers the proper security measures to minimize the damage and monitor the actions in a way not to alarm the unauthorized user who is using the owner's credential to access the system. The USE Code is an extension to the pass code to raise various alarms and have a stepwise access level control based on different inputted values.Type: GrantFiled: January 26, 2008Date of Patent: January 20, 2009Assignee: International Business Machines CorporationInventors: Thomas Hermann Gnech, Regina Illner